1 |
To convert a hexadecimal number to binary, simply covert each hexadecimal digit to _______ digits binary value: |
- A. Four
- B. Two
- C. Three
- D. Five
|
2 |
Which is the initial stage of problems solving process ? |
- A. Defining
- B. Analyzing
- C. Porgramming
- D. Stepping
|
3 |
Web browser and web servers function together as a _____ system: |
- A. Clent/server
- B. Mail
- C. Internet
- D. Chrome
|
4 |
What is the purpose of an oval shape symbol in flowcharting ? |
- A. Decision
- B. Connector
- C. Process
- D. Start or End
|
5 |
An ________ address is assigned by Dynamic Host Configuration Protocol (DHCP) server. |
|
6 |
In which method, we replace each alphabet in the plaintext by another alphabet: |
- A. Integrity
- B. Cyber
- C. Ceaser Cipher
- D. Privacy
|
7 |
Vigenere Cipher is another substitution cipher, which uses a table known as: |
- A. Vigenere Cipher table
- B. Simple table
- C. Complex table
- D. Round table
|
8 |
Which means whether the solution is giving the required results or not ? |
- A. Validation
- B. Verification
- C. Flowcharts
- D. Software
|
9 |
Which tag is used for inserting a line break. |
- A. <br>
- B. <h>
- C. <i>
- D. <m>
|
10 |
A crime in which computer network or devices are used is called a: |
- A. Lefting
- B. Phishing crime
- C. Identity Theft
- D. Cybercrime
|